Essay Available:
You are here: Home → Essay → Technology
Pages:
1 page/≈275 words
Sources:
Level:
MLA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 5.4
Topic:
Secure Computation on Encrypted Data (Essay Sample)
Instructions:
Data encryption source..
Content:
Student’s Name:
Tutor’s Name:
Course:
Date Due:
Secure Computation on Encrypted Data
Introduction
Encryption is the process of coding data such that un- authorized parties cannot access it. Encryption only minimizes the level of spoofing but it does not protect data from hackers. The process is done through the use of an encryption key together with encryption software. In recent, increased frequency of cyber-attacks in the country has led to encryption of data by various organizations. In the future most of these organizations will have all their data stored encrypted.
Encryption can either be done on a thumb drive, Smartphone or a personal computer, on either the whole folder, on specific files or on the whole storage device/ full disk encryption (FDE). For effective encryption a user should have strong encryption key in order to maintain the overall security. Online information such as in iCloud, Facebook and Emails should also be encrypted by use of hypertext transfer protocol secure. (HTTPS). Online users are always reminded to add an ‘s’ at the end of http in order to encrypt traffic between the browser and the website. For LAN or WLAN users, use of encrypted network is highly advisable. WAP2 should be used to prevent any un-secure wireless attacks.
Encryption can be done using various methods.
Hashing method of encryption is where algorithm signature for data set is created. This method of encryption alerts user when minor altercations are done on the encrypted file. The method is widely used in today’s encryption process as the process cannot be decrypted.
The second method is the use of symmetric methods. This method is not widely used because the encryption and decryption key is the same and can be easily accessible. The process works by receiving the encoded key from a user then decoding the data. Stream Cipher or...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- Crash of FedEx Flight 1478Description: Crash of FedEx Flight 1478 Technology Essay...4 pages/≈1100 words| MLA | Technology | Essay |
- Business securityDescription: The new information released today recommends that the security alleviations that Microsoft has included Technology Essay...2 pages/≈550 words| MLA | Technology | Essay |
- NetSuite (ERP Product)Description: NetSuite (ERP Product) Technology Essay...3 pages/≈825 words| MLA | Technology | Essay |